Chat with us, powered by LiveChat This week we focus on the concept of the balanced scorecard.? Pl - Writeedu

This week we focus on the concept of the balanced scorecard.? Pl

Discussion 6

This week we focus on the concept of the balanced scorecard.  Please note what it is and how organizations use balanced scorecards.  Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.Your response should be 250-300 words.  Respond to two postings provided by your classmates.

 Week 6 Discussion

This is a required assignment worth 15 points (15-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 7  (Jamsa, 2013).Chapter 7 topics:

  • Define collaboration.
  • Define and describe cloud-based collaboration.
  • The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
  • List the questions one should consider when evaluating a cloud-based collaborative solution.

  • Week 6 AssignmentInformation Systems for Business and Beyond Questions:
    • Chapter 6 – study questions 1-10, Exercise 3, 6, & 7
    • Information Technology and Organizational Learning Assignment:
    • Chapter 6 – Review the section on knowledge creation, culture, and strategy.  Explain how balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization?
    • The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment.  The paper requirements for the two-pages applies to the second part of the assignment directly related to the  Information Technology and Organizational Learning assignment.

 Study Questions 1. Briefly define each of the three members of the information security triad. 2. What does the term authentication mean? 3. What is multi-factor authentication? 4. What is role-based access control? 5. What is the purpose of encryption? 6. What are two good examples of a complex password? 7. What is pretexting? 8. What are the components of a good backup plan? 9. What is a firewall? 10. What does the term physical security mean? 

 Exercises  

 1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report your findings, then state your own opinion about these technologies 

 2. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter? 

3. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status. 

School of Computer & Information Sciences ITS-631 Operational Excellence Chapter 6 – Information Systems for Business and Beyond (2019)

Learning Objectives

identify the information security triad;

identify and understand the high-level concepts surrounding information security tools; and

secure yourself digitally.

Information Security Triad and Tools for Information Security

Information Security Triad:

Confidentiality

Integrity

Availability

Tools for Information Security

Authentication

Access Control

Read: Sidebar Password security

Encryption

Blockchain and Bitcoin

Speed of adoption

Governance

Smart Contracts

Bitcoin

Payment system that uses cryptocurrency

Backups

Full understanding of the organization's information resources

Regular backups of all data

Offsite storage of backup data sets

Test of data restoration

UPS (uninterruptible Power Supply)

Alternate or “hot” sites

Firewalls and Intrusion Detection Systems

Used to increase security on an organizational network

Intrusion Detection Systems

Placed on the network to determine if a network is being attacked.

Physical Security and Policies

Physical Security

Locked doors

Physical intrusion detection

Secured equipment

Environment monitoring

Employee training

Security policies

Administrative control

Usability and Personal Information Security

Usability

Balance the need for security and being able to access and use the resources

Personal Information Security

Keep software up to date

Install antivirus software and keep up to date

Be smart about your connections

Backup data

Secure accounts with two-factor authentication

Password management

Be suspicious of strange links and attachments

References

Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond. Retrieved from https://opentextbook.site/informationsystems2019/.

image1.emf

image2.emf

image6.png

image7.png

image8.png

image9.png

,

School of Computer & Information Sciences ITS-631- Operational Excellence Chapter 6 – Information Technology and Organizational Learning

Introduction

Examine the nature of organizational transformation, how it occurs, and how it can be measured

Three possible dimensions

Changes in goals

Changes in boundaries

Changes in activities

Organizational transformation is significant for three reasons:

Orgs that cannot change will be at risk from competition

If the org cannot evolve, it will persist in its norms and will not be able to change

If the community is forced to change, it will be unable to successfully transform and will need to be replaced.

Three Dimensions of Organizational Transformation

Goals

Two types:

Change in the market or target population

Overall goal of the organization itself changes

Boundaries

Activity systems

Driver to supporter life cycle

Aldrich’s Evolutionary Process

Figure 6.2 Aldrich’s Evolutionary Process and its relationship to ROD

Methods of Ongoing Evaluation

Organizational transformation = the retention of knowledge within the body of communities of practice.

Cultural assimilation does not occur immediately, but over periods of transition.

Use a balanced scorecard to transition emerging technologies.

Balanced Scorecard and Technology and ROD

Figure 6.5- utilizes the core balanced scorecard with technology and ROD

Balanced Scorecards and Discourse

Target Areas to integrate language and discourse and communities or practice theory with the balanced scorecard strategy:

Developing of strategy maps

Validating links across balanced scorecard perspectives

Setting Milestones

Analyzing Results

Evaluating Organizational Transformation

Knowledge Creation, Culture, and Strategy

Knowledge creation (especially in technology) has meaning in the relationship between data and information

New information does not ensure new knowledge creation

Knowledge linked to organizational transformation allows for the knowledge to be institutionalized

This process must be linked to business strategy.

The ultimate goal is to accelerate the investment in technology during the reallocation of the company for reasons of economies of scale and competitive advantage.

References

Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-138-23858-9

image1.emf

image2.emf

image6.png

image7.png

image8.png

image9.png

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now